ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆16Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for tep-attack-simulator
Users that are interested in tep-attack-simulator are comparing it to the libraries listed below
Sorting:
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 6 months ago
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆21Aug 31, 2023Updated 2 years ago
- ☆10Feb 12, 2026Updated 2 weeks ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Jun 26, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- Documentation and guidance to practice secure coding for various PLC vendors☆41Oct 27, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Extrae ip de numeros de telefono☆10Aug 28, 2023Updated 2 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆58May 1, 2024Updated last year
- Astrix Security MCP Secret Wrapper☆47Feb 21, 2026Updated last week
- ☆11Aug 31, 2023Updated 2 years ago
- DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning☆13Mar 24, 2023Updated 2 years ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 10 months ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 2 years ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- 生异形吗?挖掘构建你自己的Java内存马!☆14May 22, 2025Updated 9 months ago
- ☆10May 10, 2019Updated 6 years ago
- ☆10May 29, 2024Updated last year
- ☆33Feb 12, 2026Updated 2 weeks ago
- SetWinEventHook Sample☆50Sep 23, 2023Updated 2 years ago
- ☆13Aug 8, 2024Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year
- 热门框架/组件/服务漏洞的描述/利用/修复☆12Apr 13, 2023Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow☆12Jul 25, 2022Updated 3 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆49Nov 9, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- ☆10May 22, 2020Updated 5 years ago